Feeds

China's 'Deep Panda' crew targets Middle East policy wonks - report

Spy hackers now ignoring domestic threats - infosec bods

Using blade systems to cut costs and sharpen efficiencies

A group of China-based cyber spies have begun targeting national security think tanks, initially targeting analysts focusing on the Asia-Pacific region before switching their focus to Iraq.

Infosec threat intelligence firm CrowdStrike warns that a group it dubs Deep Panda has begun targeting think tanks, particularly those focused on the political and economics machinations of China and the Asia-Pacific regions.

The hacking crew - which previously targeted government, defence, financial, legal, and the telecommunications industries over the last three years - is using custom (largely .NET) malware and malicious power-shell scripts to hack into targeted networks.

These malware and spear-phishing-type attacks may be aimed at getting onto systems used by government officials and politicians, as well as serving as an end in themselves.

"Think tanks face some of the most advanced nation-state adversaries because the individuals who are typically targeted at these institutions tend to be former senior government officials who still have many contacts within Western governments and, as such, their private correspondence is of extreme interest to these attackers," a blog post by CrowdStrike explains.

Over the last week or so the hacking crew has switched its focus and begun targeting individuals with a tie to Iraq/Middle East issues in preference to those chewing over South East Asia policy formation.

"CrowdStrike believes DEEP PANDA knew exactly which users to target at the think tanks based on their research policy area because they rapidly pivoted from China/Asia Pacific policy experts to Iraq/Middle East policy experts once their tasking collection requirements changed," the security intelligence firm adds.

The switch in targets is being driven by geo-political events, claim the researchers.

“This is undoubtedly related to the recent Islamic State of Iraq and the Levant (ISIS) takeover of major parts of Iraq and the potential disruption for major Chinese oil interests in that country," CrowdStrike explains. "In fact, Iraq happens to be the fifth-largest source of crude oil imports for China and the country is the largest foreign investor in Iraq’s oil sector."

"Thus, it wouldn’t be surprising if the Chinese government is highly interested in getting a better sense of the possibility of deeper U.S. military involvement that could help protect the Chinese oil infrastructure in Iraq,” adds CrowdStrike. “In fact, the shift in targeting of Iraq policy individuals occurred on June 18, the day that ISIS began its attack on the Baiji oil refinery.” ®

Boost IT visibility and business value

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.